scispace - formally typeset
Journal ArticleDOI

Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards

Reads0
Chats0
TLDR
The weaknesses of Chien et al.'s scheme are shown, and an improved scheme with better security strength is proposed, which is vulnerable to a reflection attack and an insider attack.
Abstract
Recently, Chien et al. proposed an efficient remote authentication scheme using smart cards. However, we find that their scheme is vulnerable to a reflection attack and an insider attack. In addition, their scheme lacks reparability. Herein, we first show the weaknesses of Chien et al.'s scheme, and then propose an improved scheme with better security strength.

read more

Citations
More filters
Journal ArticleDOI

Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’

TL;DR: It is shown that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications, and improvements and security patches are proposed that attempt to fix the susceptibilities of his scheme.
Journal ArticleDOI

Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound

TL;DR: In this paper, a security model that can accurately capture the practical capabilities of an adversary is defined and a broad set of twelve properties framed as a systematic methodology for comparative evaluation, allowing schemes to be rated across a common spectrum.
Journal ArticleDOI

A more efficient and secure dynamic ID-based remote user authentication scheme

TL;DR: An enhanced password authentication scheme which still keeps the merits of the original scheme was presented and security analysis proved that the improved scheme is more secure and practical.
Journal ArticleDOI

Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment

TL;DR: It is shown that Liao and Wang's scheme is still vulnerable to insider's attack, masquerade attack, server spoofing attack, registration center spoofing attacked and is not reparable, and it fails to provide mutual authentication.
Journal ArticleDOI

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'

TL;DR: An enhanced authentication scheme is proposed, which covers all the identified weaknesses of Wang et al.'s scheme and is more secure and efficient for practical application environment.
References
More filters
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI

Examining smart-card security under the threat of power analysis attacks

TL;DR: In this paper, the authors examined the noise characteristics of the power signals and developed an approach to model the signal-to-noise ratio (SNR) using a multiple-bit attack.
Journal ArticleDOI

A new remote user authentication scheme using smart cards

TL;DR: This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
Journal ArticleDOI

An Efficient and Practical Solution to Remote Authentication: Smart Card

TL;DR: This work provides mutual authentication between the user and the server and achieves more functionality and requires much less computational cost than other smart card-based schemes.
Related Papers (5)